咨询与建议

限定检索结果

文献类型

  • 36 篇 期刊文献
  • 20 篇 会议

馆藏范围

  • 56 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 46 篇 工学
    • 34 篇 计算机科学与技术...
    • 26 篇 软件工程
    • 11 篇 信息与通信工程
    • 8 篇 机械工程
    • 7 篇 电气工程
    • 7 篇 控制科学与工程
    • 7 篇 生物工程
    • 4 篇 光学工程
    • 3 篇 电子科学与技术(可...
    • 3 篇 生物医学工程(可授...
    • 3 篇 安全科学与工程
    • 2 篇 交通运输工程
    • 2 篇 航空宇航科学与技...
    • 1 篇 建筑学
    • 1 篇 土木工程
  • 20 篇 理学
    • 9 篇 数学
    • 7 篇 生物学
    • 4 篇 物理学
    • 2 篇 大气科学
    • 2 篇 统计学(可授理学、...
  • 15 篇 管理学
    • 13 篇 管理科学与工程(可...
    • 4 篇 工商管理
  • 3 篇 法学
    • 2 篇 社会学
    • 1 篇 法学
  • 3 篇 医学
    • 2 篇 基础医学(可授医学...
    • 2 篇 临床医学
    • 2 篇 公共卫生与预防医...
    • 2 篇 药学(可授医学、理...
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 军事学

主题

  • 4 篇 deep learning
  • 2 篇 cyber security
  • 2 篇 object detection
  • 2 篇 support vector m...
  • 2 篇 ensemble learnin...
  • 2 篇 transfer learnin...
  • 2 篇 recommender syst...
  • 2 篇 authentication
  • 2 篇 iot
  • 2 篇 machine learning
  • 2 篇 5g mobile commun...
  • 2 篇 artificial intel...
  • 2 篇 quantum cryptogr...
  • 2 篇 cloud storage
  • 2 篇 visual attention
  • 2 篇 digital forensic...
  • 1 篇 internet of thin...
  • 1 篇 weak consensus m...
  • 1 篇 graph neural net...
  • 1 篇 cyber attacks

机构

  • 11 篇 eias data scienc...
  • 6 篇 school of comput...
  • 5 篇 eias data scienc...
  • 5 篇 key lab of educa...
  • 5 篇 school of comput...
  • 4 篇 department of ma...
  • 3 篇 prince sultan un...
  • 3 篇 department of el...
  • 3 篇 department of ma...
  • 3 篇 eias:data scienc...
  • 3 篇 school of comput...
  • 3 篇 eias data scienc...
  • 3 篇 department of in...
  • 3 篇 eias data scienc...
  • 3 篇 eias data scienc...
  • 2 篇 department of in...
  • 2 篇 the famlir group...
  • 2 篇 zhejiang univers...
  • 2 篇 guangxi key lab ...
  • 2 篇 guangxi key lab ...

作者

  • 7 篇 asim muhammad
  • 7 篇 el-latif ahmed a...
  • 6 篇 muhammad asim
  • 6 篇 mohammed elaffen...
  • 5 篇 hammad mohamed
  • 5 篇 abd el-latif ahm...
  • 5 篇 ateya abdelhamie...
  • 3 篇 zhang zuping
  • 3 篇 mohamed hammad
  • 3 篇 koucheryavy andr...
  • 3 篇 gauhar ali
  • 3 篇 sajid shah
  • 3 篇 sadique ahmad
  • 3 篇 ahmed a. abd el-...
  • 2 篇 alaa thobhani
  • 2 篇 amr abdussalam
  • 2 篇 xiaoyan kui
  • 2 篇 naveed ahmad
  • 2 篇 abdelhamied a. a...
  • 2 篇 chen nan

语言

  • 48 篇 英文
  • 8 篇 其他
  • 1 篇 中文
检索条件"机构=EIAS Data Science and BlockChain Lab College of Computer and Information Science"
56 条 记 录,以下是11-20 订阅
排序:
p, q-Spherical fuzzy sets and their aggregation operators with application to third-party logistic provider selection
收藏 引用
Journal of Intelligent and Fuzzy Systems 2024年 第1期46卷 505-528页
作者: Rahim, Muhammad Amin, Fazli Tag Eldin, ElSayed M. Abd El-Wahed Khalifa, Hamiden Ahmad, Sadique Department of Mathematics and Statistics Hazara University KP Mansehra Pakistan Future University in Egypt New Cairo Egypt Department of Mathematics College of Science and Arts Qassim University Al-Badaya Saudi Arabia Department of Operations and Management Research Faculty of Graduate Studies for Statistical Research Cairo University Giza Egypt EIAS: Data Science and Blockchain Laboratory College of Computer and Information Sciences Prince Sultan University Riyadh Saudi Arabia
The selection of an appropriate third-party logistics (3PL) provider has become an inescapable option for shippers in today's business landscape, as the outsourcing of logistics activities continues to increase. C... 详细信息
来源: 评论
Automated heart disease prediction using improved explainable learning-based technique
收藏 引用
Neural Computing and Applications 2024年 第26期36卷 16289-16318页
作者: Bizimana, Pierre Claver Zhang, Zuping Hounye, Alphonse Houssou Asim, Muhammad Hammad, Mohamed El-Latif, Ahmed A. Abd School of Computer Science and Engineering Central South University Changsha410083 China School of Mathematics and Statistics Central South University Changsha410008 China EIAS Data Science Lab College of Computer and Information Sciences and Center of Excellence in Quantum and Intelligent Computing Prince Sultan University Riyadh11586 Saudi Arabia School of Computer Science and Technology Guangdong University of Technology Guangzhou510006 China Department of Mathematics and Computer Science Faculty of Science Menoufia University Shebin El-Koom Egypt Information Technology Department Faculty of Computers and Information Menoufia University Shebin El-Koom Egypt
Heart disease (HD) stands as a major global health challenge, being a predominant cause of death and demanding intricate and costly detection methods. The widespread impact of heart failure, contributing to increased ... 详细信息
来源: 评论
PVDM-YOLOv8l: a solution for reliable pedestrian and vehicle detection in autonomous vehicles under adverse weather conditions
收藏 引用
Multimedia Tools and Applications 2024年 1-26页
作者: Tahir, Noor Ul Ain Zhang, Zuping Asim, Muhammad Iftikhar, Sundas A. Abd El-Latif, Ahmed School of Computer Science and Engineering Central South University Changsha410083 China EIAS Data Science Lab College of Computer and Information Sciences and Center of Excellence in Quantum and Intelligent Computing Prince Sultan University Riyadh11586 Saudi Arabia Gianforte School of Computing Montana State University Bozeman59717 United States Department of Mathematics and Computer Science Faculty of Science Menoufia University Shebin El-Koom32511 Egypt
Ensuring the safe navigation of autonomous vehicles in intelligent transportation system depends on their ability to detect pedestrians and vehicles. While transformer-based models for object detection have shown rema... 详细信息
来源: 评论
Adaptive Attribute-Based Honey Encryption: A Novel Solution for Cloud data Security
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 2637-2664页
作者: Reshma Siyal Muhammad Asim Long Jun Mohammed Elaffendi Sundas Iftikhar Rana Alnashwan Samia Allaoua Chelloug School of Computer Science and Engineering Central South UniversityChangsha410083China EIAS LAB College of Computer and Information Sciencesand Center of Excellence in Quantum and Intelligent ComputingPrince Sultan UniversityRiyadh11586Saudi Arabia Gianforte School of Computing Montana State UniversityBozemanMT 59717USA Department of Information Technology College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityRiyadh11671Saudi Arabia
A basic procedure for transforming readable data into encoded forms is encryption, which ensures security when the right decryption keys are used. Hadoop is susceptible to possible cyber-attacks because it lacks built... 详细信息
来源: 评论
Advancements and Challenges in Space Exploration and Cyber Threat Mitigation Techniques: A Comprehensive Review  57
Advancements and Challenges in Space Exploration and Cyber T...
收藏 引用
57th IAA Symposium on Safety, Quality and Knowledge Management in Space Activities at the 75th International Astronautical Congress, IAC 2024
作者: Almousa, May M. Abd El-Latif, Ahmed A. Information Technology Department College of Computer and Information Sciences Princess Nourah Bint Abdulrahman University Riyadh11671 Saudi Arabia EIAS Data Science Lab College of Computer and Information Sciences Center of Excellence in Quantum and Intelligent Computing Prince Sultan University Riyadh11586 Saudi Arabia
Space exploration has been revolutionized by deep learning (DL) and machine learning (ML) technologies, enabling advanced data analysis, spacecraft navigation, and mission planning. However, the increasing reliance on... 详细信息
来源: 评论
Generative Image Steganography Based on Latent Space Vector Coding and Diffusion Model  1
收藏 引用
2nd International Conference on Artificial Intelligence Security and Privacy, AIS and P 2024
作者: Liu, Weisong Yang, Jianfeng Huang, Jiewen El-Latif, Ahmed A. Abd Zhou, Zhili School of Artificial Intelligence Guangzhou University Guangzhou China School of Computer Science and Cyber Engineering Guangzhou University Guangzhou China EIAS Data Science Lab College of Computer and Information Sciences and Center of Excellence in Quantum and Intelligent Computing Prince Sultan University Riyadh11586 Saudi Arabia
Image steganography is a technology that embed secret information within a cover image to obtain a stego-image for covert communication. The transmission of undetectable stego-images via social media can facilitate se... 详细信息
来源: 评论
Intrusion Detection in the Internet of Things Using Fusion of GRU-LSTM Deep Learning Model
收藏 引用
Intelligent Automation & Soft Computing 2023年 第8期37卷 2279-2290页
作者: Mohammad S.Al-kahtani Zahid Mehmood Tariq Sadad Islam Zada Gauhar Ali Mohammed ElAffendi Department of Computer Engineering Prince Sattam Bin Abdulaziz UniversityAl-Kharj16273Saudi Arabia Department of Computer Engineering University of Engineering and TechnologyTaxila47050Pakistan The FAMLIR Group The University of LahoreLahore54000Pakistan Department of Computer Science University of Engineering&TechnologyMardan23200Pakistan Faculty of Computing International Islamic UniversityIslamabad44000Pakistan EIAS Data Science and Blockchain Lab College of Computer and Information SciencesPrince Sultan UniversityRiyadh11586Saudi Arabia
Cybersecurity threats are increasing rapidly as hackers use advanced *** a result,cybersecurity has now a significant factor in protecting organizational *** detection systems(IDSs)are used in networks to flag serious... 详细信息
来源: 评论
Privacy-Preserving Stable data Trading for Unknown Market Based on blockchain
收藏 引用
IEEE Transactions on Mobile Computing 2025年 第7期24卷 5615-5631页
作者: Deng, Qingyong Zuo, Qinghua Li, Zhetao Liu, Haolin Xie, Yong Key Lab of Education Blockchain and Intelligent Technology Ministry of Education Guangxi Normal University Guilin541004 China Guangxi Key Lab of Multi-source Information Mining & Security Guangxi Normal University Guilin541004 China College of Information Science and Technology Jinan University Guangzhou510632 China School of Computer Science Xiangtan University Xiangtan Hunan411105 China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing Jiangsu210042 China
Crowdsensing data Trading (CDT) has emerged as a novel data trading paradigm, where market stability is crucial during the transaction matching process. However, most existing CDT systems usually assume that the prefe... 详细信息
来源: 评论
3D-HRFC: 3D-Aware Image Generation at High Resolution with Faster Convergence  21st
3D-HRFC: 3D-Aware Image Generation at High Resolution with...
收藏 引用
21st Pacific Rim International Conference on Artificial Intelligence, PRICAI 2024
作者: Xia, Qiqiang Chen, Junhong Li, Tianxiao Huang, Yiheng Asim, Muhammad Michiels, Nick Liu, Wenyin School of Computer Science and Technology Guangdong University of Technology Guangzhou510006 China Hasselt University - Flanders Make - Expertise Centre for Digital Media Diepenbeek Belgium EIAS Data Science Lab College of Computer and Information Sciences Prince Sultan University Riyadh11586 Saudi Arabia Zhongguancun Laboratory Beijing China
Learning 3D-aware generators from 2D image collections has attracted significant attention in the field of generative modeling. However, there are several challenges in generating high-resolution multi-view consistent... 详细信息
来源: 评论
A Novel Image Encryption and Decoding Approach Based on DNA Coding and Arnold's Transformation for IoT Applications
A Novel Image Encryption and Decoding Approach Based on DNA ...
收藏 引用
2024 International Telecommunications Conference, ITC-Egypt 2024
作者: Shaltout, Nawal Abd El-Latif, Ahmed A. Al-Adrousy, Waleed Hammad, Mohamed Ateya, Abdelhamied A. Elmougy, Samir Mansoura University Faculty of Computers and Information Department of Computer Science Mansoura35516 Egypt Prince Sultan University EIAS Data Science Lab College of Computer and Information Sciences Riyadh11586 Saudi Arabia Menoufia University Faculty of Science Department of Mathematics and Computer Science 32511 Egypt Menoufia University Faculty of Computers and Information Department of Information Technology Shibin El Kom32511 Egypt Zagazig University Department of Electronics and Communications Engineering Zagazig Egypt
Nowadays, the Internet of Things (IoT) is significantly utilized by an extensive range of applications that lead to the enhancement of different aspects of defense and military capabilities. In IoT, a wide range of sm... 详细信息
来源: 评论